• 제목/요약/키워드: User Internet

검색결과 4,231건 처리시간 0.029초

인터넷 기반 프로펠러 설계 시스템 개발 (Development of Internet-Based Propeller Design System)

  • 이왕수;박범진;이창섭
    • 대한조선학회논문집
    • /
    • 제40권6호
    • /
    • pp.69-79
    • /
    • 2003
  • Existing large-scale complex programs usually reside In a single computer, and the user has to be physically in contact with the computer. With the wide spread use of the internet, the need to carry out the design and analysis tasks geographically away from the main computer is increasing. In this paper existing Windows-based propeller design and analysis package is separated into the server-client modules and the protocol program is developed to implement the communication between multi-client computers and a single server computer. A new protocol packet is designed to use the Windows socket and the server/client programs control the receive/send operations using the information transmitted in the packet. Test runs show that the remote user, connected to the server computer through the internet only, can perform the required tasks.

인터넷 쇼핑몰의 e-Loyalty 향상을 위한 이미지, 신뢰, 몰입에 관한 연구

  • 이종만;오재신
    • 한국정보시스템학회:학술대회논문집
    • /
    • 한국정보시스템학회 2005년도 추계학술대회 발표 논문집
    • /
    • pp.235-248
    • /
    • 2005
  • This paper examines internet shopping mall e-loyalty behaviors. Conceptually, the paper relied on the relatively established literature on ' traditional ' store image and technology acceptance research. And proposes an integrated model including factors on customer e-loyalty in shopping environment. For this purpose, internet shopping mall user's image is proposed to affect trust, and commitment, and consequently to influence customer loyalty behaviors. The empirical results indicated that shopping mal image take significant effect on trust and customer loyalty behaviors. And commitment variable are effective mediators linking internet shopping mall user's trust and their loyalty behaviors. The proposed model and empirical results would contribute to setting up strategy shopping mall industry, and also to future research in information systems and internet marketing.

  • PDF

인터넷상에서의 실시간 주문형 비디오 설계 및 구현 (A Design and Iplementation of Real Time Video on Demand on Internet)

  • 이종철;탁영봉
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 1998년도 추계종합학술대회 논문집
    • /
    • pp.7-10
    • /
    • 1998
  • In implementing real time video on demand(VOD), the increase of user on internet causes a network traffic congestion. In this paper, we programmed a CGI able to login in VOD home for limiting the number of user in solving the problem, and also applied and adaptive multimedia synchronization technique for controlling video and audio data in a network. In addition, a real time multimedia player was designed and implemented in a personal computer operating at Window95/98/NT.

  • PDF

ECC based Authentication Scheme for Securing Data Contents over Open Wireless Network Systems

  • Caytiles, Ronnie D.;Park, Byungjoo
    • 한국정보기술학회 영문논문지
    • /
    • 제8권2호
    • /
    • pp.1-11
    • /
    • 2018
  • Multimedia contents have been increasingly available over the Internet as wireless networks systems are continuously growing popular. Unlimited access from various users has led to unauthorized access of third parties or adversaries. This paper deals with the implementation of elliptic curve cryptography (ECC) based user authentication for securing multimedia contents over the Internet. The ECC technique has been incorporated with the advanced encryption standard (AES) algorithm to ensure the complexity of the proposed authentication scheme and to guarantee authenticity of multimedia services.

A Review of Cross-Cultural Design to Improve User Engagement for Learning Management System

  • Farhan Hanis Muhmad Asri;Dalbir Singh;Zulkefli Mansor;Helmi Norman
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제18권2호
    • /
    • pp.397-419
    • /
    • 2024
  • Online learning has become a widespread practice for students and teachers in acquiring and delivering knowledge. Education platforms have become prominent in the 21st century with the evolution of technology and the accessibility to online learning. As a result, various learning management systems (LMSs) have been introduced to facilitate online interaction between users. For instance, communication between students and teachers at school. However, there is a need to emphasise user engagement in LMS to enhance the online learning experience amongst students since the design of LMS affects user engagement. This study utilised a systematic literature review (SLR) that examined 74 articles published between 2014 and 2023, focusing on cross-cultural design (CCD), user-centred design (UCD), and usability in LMS design. This study aimed to review CCD and its association with UCD, user interfaces (UI), and user experience (UX) in the context of LMS. CCD has been introduced as an approach to design that embraces different cultures, languages, and social contexts, while UCD plays a significant role in defining user engagement for LMS. All elements in CCD and UCD help create a better user experience for LMS. Besides, this study reviewed the usability of selected LMS to give insights to developers in creating a positive user engagement. An insight into cultural factors that influence the usability of LMS has revealed their value for LMS design, such as the UI/UX elements. Initially, this study may guide future researchers in improving education quality by emphasising CCD and LMS usability, which can enhance user engagement.

Cryptanalysis of an 'Efficient-Strong Authentiction Protocol (E-SAP) for Healthcare Applications Using Wireless Medical Sensor Networks'

  • Khan, Muhammad Khurram;Kumari, Saru;Singh, Pitam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권5호
    • /
    • pp.967-979
    • /
    • 2013
  • Now a day, Wireless Sensor Networks (WSNs) are being widely used in different areas one of which is healthcare services. A wireless medical sensor network senses patient's vital physiological signs through medical sensor-nodes deployed on patient's body area; and transmits these signals to devices of registered medical professionals. These sensor-nodes have low computational power and limited storage capacity. Moreover, the wireless nature of technology attracts malicious minds. Thus, proper user authentication is a prime concern before granting access to patient's sensitive and private data. Recently, P. Kumar et al. claimed to propose a strong authentication protocol for healthcare using Wireless Medical Sensor Networks (WMSN). However, we find that P. Kumar et al.'s scheme is flawed with a number of security pitfalls. Information stored inside smart card, if extracted, is enough to deceive a valid user. Adversary can not only access patient's physiological data on behalf of a valid user without knowing actual password, can also send fake/irrelevant information about patient by playing role of medical sensor-node. Besides, adversary can guess a user's password and is able to compute the session key shared between user and medical sensor-nodes. Thus, the scheme looses message confidentiality. Additionally, the scheme fails to resist insider attack and lacks user anonymity.

Adaptive Recommendation System for Tourism by Personality Type Using Deep Learning

  • Jeong, Chi-Seo;Lee, Jong-Yong;Jung, Kye-Dong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제12권1호
    • /
    • pp.55-60
    • /
    • 2020
  • Adaptive recommendation systems have been developed with big data processing as a system that provides services tailored to users based on user information and usage patterns. Deep learning can be used in these adaptive recommendation systems to handle big data, providing more efficient user-friendly recommendation services. In this paper, we propose a system that uses deep learning to categorize and recommend tourism types to suit the user's personality. The system was divided into three layers according to its core role to increase efficiency and facilitate maintenance. Each layer consists of the Service Provisioning Layer that real users encounter, the Recommendation Service Layer, which provides recommended services based on user information entered, and the Adaptive Definition Layer, which learns the types of tourism suitable for personality types. The proposed system is highly scalable because it provides services using deep learning, and the adaptive recommendation system connects the user's personality type and tourism type to deliver the data to the user in a flexible manner.

Joint Spectrum and Power Allocation for Green D2D Communication with Physical Layer Security Consideration

  • Chen, Hualiang;Cai, Yueming;Wu, Dan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권3호
    • /
    • pp.1057-1073
    • /
    • 2015
  • In this paper, we consider cooperative D2D communications in cellular networks. More precisely, a cellular user leases part of its spectrum to facilitate the D2D communication with a goal of improving the energy efficiency of a D2D pair. However the D2D pair is untrusted to the cellular user, such resource sharing may result in the information of this cellular user unsecured. In order to motivate the cellular user's generosity, this D2D pair needs to help the cellular user maintain a target secrecy rate. To address this issue, we formulate a joint spectrum and power allocation problem to maximize the energy efficiency of the D2D communication while guaranteeing the physical layer security of the cellular user. Then, a theorem is proved to indicate the best resource allocation strategy, and accordingly, an algorithm is proposed to find the best solution to this resource allocation problem. Numerical results are finally presented to verify the validity and effectiveness of the proposed algorithm.

Performance Analysis of Cellular Networks with D2D communication Based on Queuing Theory Model

  • Xin, Jianfang;Zhu, Qi;Liang, Guangjun;Zhang, Tiaojiao;Zhao, Su
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권6호
    • /
    • pp.2450-2469
    • /
    • 2018
  • In this paper, we develop a spatiotemporal model to analysis of cellular user in underlay D2D communication by using stochastic geometry and queuing theory. Firstly, by exploring stochastic geometry to model the user locations, we derive the probability that the SINR of cellular user in a predefined interval, which constrains the corresponding transmission rate of cellular user. Secondly, in contrast to the previous studies with full traffic models, we employ queueing theory to evaluate the performance parameters of dynamic traffic model and formulate the cellular user transmission mechanism as a M/G/1 queuing model. In the derivation, Embedded Markov chain is introduced to depict the stationary distribution of cellular user queue status. Thirdly, the expressions of performance metrics in terms of mean queue length, mean throughput, mean delay and mean dropping probability are obtained, respectively. Simulation results show the validity and rationality of the theoretical analysis under different channel conditions.

Interactive Conflict Detection and Resolution for Personalized Features

  • Amyot Daniel;Gray Tom;Liscano Ramir;Logrippo Luigi;Sincennes Jacques
    • Journal of Communications and Networks
    • /
    • 제7권3호
    • /
    • pp.353-366
    • /
    • 2005
  • In future telecommunications systems, behaviour will be defined by inexperienced users for many different purposes, often by specifying requirements in the form of policies. The call processing language (CPL) was developed by the IETF in order to make it possible to define telephony policies in an Internet telephony environment. However, user-defined policies can hide inconsistencies or feature interactions. In this paper, a method and a tool are proposed to flag inconsistencies in a set of policies and to assist the user in correcting them. These policies can be defined by the user in a user-friendly language or derived automatically from a CPL script. The approach builds on a pre-existing logic programming tool that is able to identify inconsistencies in feature definitions. Our new tool is capable of explaining in user-oriented terminology the inconsistencies flagged, to suggest possible solutions, and to implement the chosen solution. It is sensitive to the types of features and interactions that will be created by naive users. This tool is also capable of assembling a set of individual policies specified in a user-friendly manner into a single CPL script in an appropriate priority order for execution by telecommunication systems.